CVE-2025-0910
Published: 11 February 2025
Description
PDF-XChange Editor U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25748.
Security Summary
CVE-2025-0910 is an out-of-bounds write vulnerability in the U3D file parsing component of PDF-XChange Editor, enabling remote code execution. The flaw stems from insufficient validation of user-supplied data during U3D file processing, allowing a write past the end of an allocated object. This affects installations of PDF-XChange Editor, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and is associated with CWE-787 (Out-of-bounds Write). The vulnerability was originally tracked as ZDI-CAN-25748.
Remote attackers can exploit this vulnerability by tricking a target user into visiting a malicious web page or opening a malicious file containing a specially crafted U3D payload. No privileges are required (PR:N), and exploitation occurs over the network (AV:N) with low complexity (AC:L), though user interaction is necessary (UI:R). Successful exploitation allows the attacker to execute arbitrary code in the context of the PDF-XChange Editor process, potentially leading to high confidentiality, integrity, and availability impacts (C:H/I:H/A:H) within the affected scope (S:U).
The Zero Day Initiative has published an advisory at https://www.zerodayinitiative.com/advisories/ZDI-25-065/ addressing this vulnerability.
Details
- CWE(s)